Rekayasa Perangkat Lunak
|
|
- Elvin French
- 5 years ago
- Views:
Transcription
1 Rekayasa Perangkat Lunak Untuk SISTEM KOMPUTER Kuliah 7: Use Case Mohammad Iqbal Based-on slide Ivan Marsic
2 Topik Aktor, Tujuan Sketsa/Ringkasan Use Cases Diagram Use Case Matrik Traceability System Boundary dan Subsystem Use Case Specification Detail Diagram System Sequence Security dan Managemen Resiko
3 Use Cases Digunakan untuk analisis kebutuhan fungsional dan Specification Use case adalah deskripsi langkah demi langkah bagaimana user menggunakan sistem untuk menyelesaikan tujuan bisnis Detailed use cases are usually written as usage scenarios or scripts, showing an envisioned sequence of actions and interactions between the external actors and the system-to-be
4 Deriving Use Cases from System Requirements REQ1: Keep door locked and auto-lock REQ2: Lock w hen LOCK pressed REQ3: Unlock w hen valid key provided REQ4: Allow mistakes but prevent dictionary attacks REQ5: Maintain a history log REQ6: Adding/removing users at runtime REQ7: Configuring the device activation preferences REQ8: Inspecting the access history REQ9: Filing inquiries Y Actor Actor s Goal (what the actor intends to accomplish) Use Case Name Landlord To disarm the lock and enter, and get space lighted up. Unlock (UC-1) Landlord To lock the door & shut the lights (sometimes?). Lock (UC-2) Landlord To create a new user account and allow access to home. AddUser (UC-3) Landlord To retire an existing user account and disable access. RemoveUser (UC-4) Tenant To find out who accessed the home in a given interval of time and potentially file complaints. InspectAccessHistory (UC-5) Tenant To disarm the lock and enter, and get space lighted up. Unlock (UC-1) Tenant To lock the door & shut the lights (sometimes?). Lock (UC-2) Tenant To configure the device activation preferences. SetDevicePrefs (UC-6) LockDevice To control the physical lock mechanism. UC-1, UC-2 LightSwitch To control the lightbulb. UC-1, UC-2 [to be identified] To auto-lock the door if it is left unlocked for a given interval of time. AutoLock (UC-2) ( Actors already given if working from user stories instead of system requirements )
5 Types of Actors Initiating actor (also called primary actor or simply user ): initiates the use case to achieve a goal Participating actor (also called secondary actor): participates in the use case but does not initiate it. Subtypes of participating actors: Supporting actor: helps the system-to-be to complete the use case Offstage actor: passively participates in the use case, i.e., neither initiates nor helps complete the use case, but may be notified about some aspect of it (e.g., for keeping records)
6 Use Case Diagram: Device Control UC1: Unlock UC2: Lock UC3: AddUser UC4: RemoveUser UC5: InspectAccessHistory UC6: SetDevicePrefs UC7: AuthenticateUser UC8: Login system boundary First tier use cases Second tier use cases actor «initiate» «initiate» UC1: Unlock «include» UC7: AuthenticateUser «participate» «participate» «participate» LockDevice Tenant «initiate» «initiate» UC2: Lock «participate» «participate» LightSwitch «initiate + participate» Landlord communication use case Timer
7 Use Case Diagram: Account Management UC1: Unlock UC2: Lock UC3: AddUser UC4: RemoveUser UC5: InspectAccessHistory UC6: SetDevicePrefs UC7: AuthenticateUser UC8: Login Account Management Subsystem «initiate» UC3: AddUser Landlord «initiate» «participate» «initiate» «initiate» UC4: RemoveUser UC5: InspectAccessHistory «include» «include» «include» «include» UC8: Login Tenant UC6: SetDevicePrefs
8 GUI for UC6: Set Device Pref s Device Preferences File Configure Help Activate for valid key Activate for burglary attempt Lights Music Air-conditioning Heating Alarm bell Police Send SMS Apply Close ( NOTE: Lock device is mandatory, not an option )
9 Use Case Generalizations More abstract representations can be derived from particular representations UC1: Unlock UC2: Lock UC3: AddUser UC4: RemoveUser UC5: InspectAccessHistory UC6: SetDevicePrefs UC7: AuthenticateUser UC8: Login Authorized Person UC9: ManageUsers Tenant Landlord UC3: AddUser UC4: RemoveUser Actor Generalization Use Case Generalization
10 Optional Use Cases: «extend» Example optional use cases: ManageAccount UC5: InspectAccessHistory UC1: Unlock UC2: Lock UC3: AddUser UC4: RemoveUser UC5: InspectAccessHistory UC6: SetDevicePrefs UC7: AuthenticateUser UC8: Login UC6: SetDevicePrefs Key differences between «include» and «extend» relationships Is this use case optional? Is the base use case complete without this use case? Included use case No No Extending use case Yes Yes Is the execution of this use case conditional? Does this use case change the behavior of the base use case? No No Yes Yes [ Source: Robert Maksimchuk & Eric Naiburg: UML for Mere Mortals, Addison-Wesley, ]
11 Login Use Case? BAD: GOOD: Login Landlord AddUser SetDevicePrefs Landlord AddUser SetDevicePrefs Login
12 Traceability Matrix (1) Mapping: System requirements to Use cases REQ1: Keep door locked and auto-lock REQ2: Lock w hen LOCK pressed REQ3: Unlock w hen valid key provided REQ4: Allow mistakes but prevent dictionary attacks REQ5: Maintain a history log REQ6: Adding/removing users at runtime REQ7: Configuring the device activation preferences REQ8: Inspecting the access history REQ9: Filing inquiries Req t PW UC1 UC2 UC3 UC4 UC5 UC6 UC7 UC8 UC1: Unlock UC2: Lock UC3: AddUser UC4: RemoveUser UC5: InspectAccessHistory UC6: SetDevicePrefs UC7: AuthenticateUser UC8: Login REQ1 5 REQ2 2 REQ3 5 REQ4 4 REQ5 2 REQ6 1 REQ7 2 REQ8 1 REQ9 1 Max PW Total PW Continued for domain model, design diagrams,
13 Traceability Matrix Purpose To check that all requirements are covered by the use cases To check that none of the use cases is introduced without a reason (i.e., created not in response to any requirement) To prioritize the work on use cases
14 Schema for Detailed Use Cases Use Case UC-#: Name / Identifier [verb phrase] Related Requirements: Initiating Actor: Actor s Goal: Participating Actors: List of the requirements that are addressed by this use case Actor who initiates interaction with the system to accomplish a goal Informal description of the initiating actor s goal Actors that will help achieve the goal or need to know about the outcome Preconditions: Postconditions: Flow of Events for Main Success Scenario: What is assumed about the state of the system before the interaction starts What are the results after the goal is achieved or abandoned; i.e., what must be true about the system at the time the execution of this use case is completed 1. The initiating actor delivers an action or stimulus to the system (the arrow indicates the direction of interaction, to- or from the system) 2. The system s reaction or response to the stimulus; the system can also send a message to a participating actor, if any 3. Flow of Events for Extensions (Alternate Scenarios): What could go wrong? List the exceptions to the routine and describe how they are handled 1a. For example, actor enters invalid data 2a. For example, power outage, network failure, or requested data unavailable The arrows on the left indicate the direction of interaction: Actor s action; System s reaction
15 Use Case 1: Unlock Use Case UC-1: Related Requirem ts: Initiating Actor: Actor s Goal: Unlock REQ1, REQ3, REQ4, and REQ5 stated in Table 2-1 Any of: Tenant, Landlord To disarm the lock and enter, and get space lighted up automatically. Participating Actors: Preconditions: Postconditions: LockDevice, LightSwitch, Timer The set of valid keys stored in the system database is non-empty. The system displays the menu of available functions; at the door keypad the menu choices are Lock and Unlock. The auto-lock timer has started countdown from autolockinterval. Flow of Events for Main Success Scenario: 1. Tenant/Landlord arrives at the door and selects the menu item Unlock 2. include::authenticateuser (UC-7) 3. System (a) signals to the Tenant/Landlord the lock status, e.g., disarmed, (b) signals to LockDevice to disarm the lock, and (c) signals to LightSwitch to turn the light on 4. System signals to the Timer to start the auto-lock timer countdown 5. Tenant/Landlord opens the door, enters the home [and shuts the door and locks]
16 Subroutine «include» Use Case Use Case UC-7: AuthenticateUser (sub-use case) Related Requirements: Initiating Actor: Actor s Goal: Participating Actors: Preconditions: Postconditions: REQ3, REQ4 stated in Table 2-1 Any of: Tenant, Landlord To be positively identified by the system (at the door interface). AlarmBell, Police The set of valid keys stored in the system database is non-empty. The counter of authentication attempts equals zero. None worth mentioning. Flow of Events for Main Success Scenario: 1. System prompts the actor for identification, e.g., alphanumeric key 2. Tenant/Landlord supplies a valid identification key 3. System (a) verifies that the key is valid, and (b) signals to the actor the key validity Flow of Events for Extensions (Alternate Scenarios): 2a. Tenant/Landlord enters an invalid identification key 1. System (a) detects error, (b) marks a failed attempt, and (c) signals to the actor System (a) detects that the count of failed attempts exceeds the maximum allowed 1a. number, (b) signals to sound AlarmBell, and (c) notifies the Police actor of a possible break-in 2. Tenant/Landlord supplies a valid identification key 3. Same as in Step 3 above
17 Acceptance Test Case for UC-7 Authenticate User Test-case Identifier: Use Case Tested: Pass/fail Criteria: Input Data: Test Procedure: TC-1 UC-1, main success scenario, and UC-7 The test passes if the user enters a key that is contained in the database, with less than a maximum allowed number of unsuccessful attempts Numeric keycode, door identifier Expected Result: Step 1. Type in an incorrect keycode and a valid door identifier System beeps to indicate failure; records unsuccessful attempt in the database; prompts the user to try again Step 2. Type in the correct keycode and door identifier System flashes a green light to indicate success; records successful access in the database; disarms the lock device
18 Use Case 2: Lock Use Case UC-2: Related Requirements: Initiating Actor: Lock REQ1, REQ2, and REQ5 stated in Table 2-1 Any of: Tenant, Landlord, or Timer Actor s Goal: To lock the door & get the lights shut automatically (?) Participating Actors: Preconditions: LockDevice, LightSwitch, Timer The system always displays the menu of available functions. Postconditions: The door is closed and lock armed & the auto-lock timer is reset. Flow of Events for Main Success Scenario: 1. Tenant/Landlord selects the menu item Lock System (a) signals affirmation, e.g., lock armed, (b) signals to LockDevice to arm the lock (if 2. not already armed), (c) signal to Timer to reset the auto-lock counter, and (d) signals to LightSwitch to turn the light off (?) Flow of Events for Extensions (Alternate Scenarios): 2a. System senses that the door is not closed, so the lock cannot be armed 1. System (a) signals a warning that the door is open, and (b) signal to Timer to start the alarm counter 2. Tenant/Landlord closes the door System (a) senses the closure, (b) signals affirmation to the Tenant/Landlord, (c) signals to 3. LockDevice to arm the lock, (d) signal to Timer to reset the auto-lock counter, and (e) signal to Timer to reset the alarm counter
19 Use Case 3: Add User Use Case UC-3: Related Requirements: Initiating Actor: Actor s Goal: Participating Actors: Preconditions: Postconditions: AddUser REQ6 stated in Error! Reference source not found. Landlord To register new or remove departed residents at runtime. Tenant None worth mentioning. (But note that this use case is only available on the main computer and not at the door keypad.) The modified data is stored into the database. Flow of Events for Main Success Scenario: 1. Landlord selects the menu item ManageUsers 2. Landlord identification: Include Login (UC-8) 3. System (a) displays the options of activities available to the Landlord (including Add User and Remove User ), and (b) prompts the Landlord to make selection 4. Landlord selects the activity, such as Add User, and enters the new data 5. System (a) stores the new data on a persistent storage, and (b) signals completion Flow of Events for Extensions (Alternate Scenarios): 4a. Selected activity entails adding new users: Include AddUser (UC-3) 4b. Selected activity entails removing users: Include RemoveUser (UC-4)
20 Use Case 5: Inspect Access History Use Case UC-5: Inspect Access History Related Requirements: REQ8 and REQ9 stated in Table 2-1 Initiating Actor: Any of: Tenant, Landlord Actor s Goal: Participating Actors: Preconditions: To examine the access history for a particular door. Database, Landlord Tenant/Landlord is logged in the system and is shown a hyperlink View Access History. Postconditions: None. Flow of Events for Main Success Scenario: 1. Tenant/Landlord clicks the hyperlink View Access History 2. System prompts for the search criteria (e.g., time frame, door location, actor role, event type, etc.) or Show all 3. Tenant/Landlord specifies the search criteria and submits 4. System prepares a database query that best matches the actor s search criteria and retrieves the records from the Database 5. Database returns the matching records 6. System (a) additionally filters the retrieved records to match the actor s search criteria; (b) renders the remaining records for display; and (c) shows the result for Tenant/Landlord s consideration 7. Tenant/Landlord browses, selects interesting records (if any), and requests further investigation (with an accompanying complaint description) System (a) displays only the selected records and confirms the request; (b) archives the request in 8. the Database and assigns it a tracking number; (c) notifies Landlord about the request; and (d) informs Tenant/Landlord about the tracking number
21 System Boundary & Subsystems Use Case Variations Example: Case (a): Local face recognition Local computer Apartment building Face image Security camera Case (b): Network Remote face recognition FaceReco, Ltd.
22 Modified Use Case Diagram Authentication subsystem (FaceReco, Ltd.) is externalized from the system-to-be: UC1: Unlock UC2: Lock UC3: AddUser UC4: RemoveUser UC5: InspectAccessHistory UC6: SetDevicePrefs UC7: AuthenticateUser UC8: Login UC2: Lock Tenant «participate» UC1: Unlock «include» LockDevice UC7: AuthenticateUser «initiate» UC3: AddUser «participate» «participate» Landlord «initiate» UC4: RemoveUser «include» «include» «participate» FaceReco, Ltd. UC8: Login
23 Security and Risk Management Identifying and preempting the serious risks to system s safe and successful functioning Risk types: Intolerable As low as reasonably practical (ALARP) Acceptable Example abuse case input sequence: invalid-key, invalid-key, maxnumofattempts ; wait maxattemptperiod ; invalid-key, invalid-key,
24 System Sequence Diagram [Modeling System Workflows] Use case: Unlock User «initiating actor» select function( unlock") : System LockDevice «supporting actor» LightSwitch «supporting actor» Timer «offstage actor» prompt for the key enter key verify key signal: valid key, lock open open the lock turn on the light start ("duration ) Main success scenario Similar to UML sequence diagrams, but for actor interactions instead of software object interactions
25 System Sequence Diagram [Modeling System Workflows] Use case: Unlock User «initiating actor» select function( unlock") : System AlarmBell «supporting actor» Police «offstage actor» loop prompt for the key enter key verify key signal: invalid key prompt to try again sound alarm notify intrusion Alternate scenario (burglary attempt)
26 Activity Diagram [Modeling System Workflows] Initial node Select Unlock Action Enter Key Verify Key Decision [authorized] [not authorized] Signal Success Open Lock & Lit Light Notify Intrusion Sound Alarm Start Autolock Timer Activity final node Merge
LECTURE 6: Domain Modeling. Ivan Marsic Rutgers University
LECTURE 6: Domain Modeling Ivan Marsic Rutgers University Topics Identifying Concepts Concept Attributes Concept Associations Contracts: Preconditions and Postconditions Domain Modeling Why? The goal of
More informationMTAT Software Engineering
MTAT.03.094 Software Engineering Lecture 04: Analysis Dietmar Pfahl Fall 2013 email: dietmar.pfahl@ut.ee Labs Next Week Part of the lab time will be used for assessment your Task 1 solutions Submission
More informationSWE500. LECTURE 6: Domain Modeling. Ivan Marsic Rutgers University
SWE500 LECTURE 6: Domain Modeling Ivan Marsic Rutgers University Topics Identifying Concepts Concept Attributes Concept Associations Contracts: Preconditions and Postconditions Domain Modeling Why? The
More informationLTAT Software Engineering
LTAT.05.003 Software Engineering Lecture 04: Analysis Dietmar Pfahl Fall 2016 email: dietmar.pfahl@ut.ee ICS Day 2017 Friday, 29 September When? 14:15 Where? Paabel (Ülikooli 17) What? To bring together
More informationMTAT Software Engineering
MTAT.03.094 Software Engineering Lecture 04: Analysis Dietmar Pfahl Fall 2015 email: dietmar.pfahl@ut.ee Task Resp. Prio Effort Labs This Week Lab 2 Assignment: 1. Project Planning Refinement of requirements
More informationRequirements Engineering. Materials: Pressman (chapters 8,9, 10, 11) Sommerville (Chapters 4, 5)
Requirements Engineering Materials: Pressman (chapters 8,9, 10, 11) Sommerville (Chapters 4, 5) Definition What is Requirement Engineering? Requirement: A function, constraint or other property that the
More informationRekayasa Perangkat Lunak
Rekayasa Perangkat Lunak Untuk SISTEM KOMPUTER Kuliah 2: Permodelan Obyek Mohammad Iqbal Based-on slide Ivan Marsic Topik Obyek dan Metode Calls Interface Notasi UML Relasi antar Obyek Proses/Algoritma
More informationRekayasa Perangkat Lunak
Rekayasa Perangkat Lunak Untuk SISTEM KOMPUTER Kuliah 4: Memahami Masalah dan Membagi Pekerjaan Mohammad Iqbal Based-on slide Ivan Marsic Topik Dekomposisi : Partitioning vs. Projection Divisi pekerja
More informationRekayasa Perangkat Lunak
Rekayasa Perangkat Lunak Untuk SISTEM KOMPUTER Kuliah 3: Manajemen Konfigurasi Perangkat Lunak Mohammad Iqbal Based-on slide Ivan Marsic Topik Definisi Skenario Kerja Revisi fungsi kontrol Git and GitHub
More informationChapter 7 Desain Rekayasa Perangkat Lunak Analysis Modeling. Software Engineering: A Practitioner s Approach by Roger S. Pressman
Chapter 7 Desain Rekayasa Perangkat Lunak Analysis Modeling Software Engineering: A Practitioner s Approach by Roger S. Pressman Material Scenario-Based Modeling Flow Oriented Modeling Class-Bases Modeling
More informationMTAT Software Engineering. Written Exam 10 January Start: 9:15 End: 11:45
MTAT.03.094 Software Engineering Written Exam 10 January 2014 Start: 9:15 End: 11:45 Important Notes: The exam is open book and open laptop. Web browsing is allowed, but you are not allowed to use e mail
More informationRekayasa Perangkat Lunak
Rekayasa Perangkat Lunak Untuk SISTEM KOMPUTER Kuliah 6: Arsitektur Perangkat Lunak Mohammad Iqbal Based-on slide Ivan Marsic Topik Desain Arsitektur Perangkat Lunak Keputusan Arsitektural & Key Concerns
More information: DOOR ENTRY UNIT USER MANUAL EIS-LCD. Programming Software
: DOOR ENTRY UNIT EIS-LCD Programming Software v.2.0 2018 Page 1 Contents 1 FOR YOUR SAFETY...5 2 INTRODUCTION...6 3 EIS-LCD, EIS-40 FEATURES AND APPLICATIONS...7 4 START UP...8 5 LED INDICATION...9 6
More informationAuthor: Group 03 Yuly Suvorov, Luke Harvey, Ben Holland, Jordan Cook, Michael Higdon. All Completed SRS2 Steps
Software Requirements Document for Graffiti Author: Group 03 Yuly Suvorov, Luke Harvey, Ben Holland, Jordan Cook, Michael Higdon Version Date Author Change 0.1 09/13/ SM Initial Document 07 0.2 09/22/
More informationModeling Requirements
Modeling Requirements Critical Embedded Systems Dr. Balázs Polgár Prepared by Budapest University of Technology and Economics Faculty of Electrical Engineering and Informatics Dept. of Measurement and
More information: DOOR ENTRY UNIT. Programming Software USER MANUAL
: DOOR ENTRY UNIT Programming Software MODELS: EIS-1, EIS-2 OR EIS-4 v.02 2018 Contents 1 FOR YOUR SAFETY...4 2 INTRODUCTION...5 3 EIS-1, EIS-2, EIS-4 FEATURES AND APPLICATIONS...6 4 START UP...7 5 LED
More informationUSER GUIDE for ios 1
USER GUIDE for ios 1 CONTENTS GETTING STARTED 3 DOWNLOAD THE SECURESMART APP 3 LOGIN 3 DASHBOARD 4 MENU 5 SETTING UP TOUCH ID 6 USING THE APPLICATION 7 SECURITY SYSTEM KEYPAD 7 HOME AUTOMATION 8 VIEWING
More informationCall-in Agent Configuration 9
Call-in Agent Configuration 9 9.1 Overview of the Call-in Agent The Call-in Agent enables users to access OPC data over the phone. The Call-in Agent configuration sets up the voice and key entries and
More informationR A D I O N I C S. READYKEY K6100 Readykey for Windows. User Guide. Logging In. Logging Out. If an ID device has been issued:
R A D I O N I C S READYKEY K6100 Readykey for Windows User Guide Logging In If an ID device has been issued: 1. Use your ID device with the desktop administration or Central Network Controller (CNC) reader,
More informationMANAGING LOCAL AUTHENTICATION IN WINDOWS
MANAGING LOCAL AUTHENTICATION IN WINDOWS Credentials Manager Windows OS has a set of tools that help remedy some of the authentication challenges. For example, the Credential Manager in Windows 7 and newer
More informationAcceptance Test Plan
Acceptance Test Plan Terminus Security Contents Power Control... 5 Door Lock... 5 Video Capture... 6 Motion Detection... 7 Temperature Sensing... 7 UPS... 8 Token Authentication... 8 Logging System...
More informationConfiguring a Net2 Entry Monitor
Configuring a Entry Monitor Overview The Entry monitor is an audio/video monitor used to remotely communicate with visitors. It is powered using power over Ethernet (PoE) and communicates with the other
More informationLesson 3: Identifying Key Characteristics of Workgroups and Domains
1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users
More informationIntegriti User Manual. Elite / EliteX LCD Terminal Keypads
Integriti User Manual Elite / EliteX LCD Terminal Keypads INNER RANGE recommends that all INTEGRITI systems are installed & maintained by FACTORY CERTIFIED TECHNICIANS. For a list of Accredited Dealers
More informationDocument Number: /4/2012
Copyright 2012 icontrol Networks, Inc. All rights reserved. No reproduction in whole or in part without prior written approval. icontrol Networks, icontrol, and icontrol logo design are pending trademarks
More informationSOLO KP SOLO KP LCD COMPACT MULTI-APARTMENT GSM DOOR ENTRY UNIT USER MANUAL
SOLO KP SOLO KP LCD COMPACT MULTI-APARTMENT GSM DOOR ENTRY UNIT Contents 1 FOR YOUR SAFETY... 4 2 INTRODUCTION... 5 3 SOLO-KP AND SOLO-KP LCD FEATURES AND APPLICATIONS... 6 4 START UP... 7 5 LED INDICATION...
More informationD1260/D1260B. Owner's Manual. Keypad
D1260/D1260B EN Owner's Manual Keypad D1260/D1260B Owner's Manual This system includes a telephone line seizure feature. The system may be programmed to communicate with a central monitoring station to
More informationSafehome Project. Analysis Model Prepared by Inyoung Kim Donghan Jang <TEAM 6> KAIST CS350 Introduction to Software Engineering
Safehome Project Analysis Model 2015.5.6 Prepared by Inyoung Kim Donghan Jang KAIST CS350 Introduction to Software Engineering 1 Bootup Feature 1.1 Use case diagram Picture 1: Bootup use case
More informationControl Panels B9512G/B8512G/B6512/B5512/B4512/B3512. en Owner's Manual
Control Panels B9512G/B8512G/B6512/B5512/B4512/B3512 en Owner's Manual Control Panels Table of Contents en 3 Table of contents 1 Introduction 8 1.1 About documentation 9 2 Keypads overview 11 2.1 Identify
More informationEUROPLEX TECHNOLOGIES. WARNING. Copyright. Disclaimer
EUROPLEX TECHNOLOGIES. Company Web Site address: www.europlex.com Europlex Technologies [Ireland] Ltd. Clonshaugh Industrial Estate, Clonshaugh, Dublin 17, Ireland. Tel: +353-1 - 8485111 Fax: +353-1 -
More informationR A D I O N I C S READYKEY K6100 READYKEY FOR WINDOWS. User Instructions. Logging In. Logging Out. If an ID device has been issued:
R A D I O N I C S READYKEY K6100 READYKEY FOR WINDOWS User Instructions Logging In If an ID device has been issued: 1. Use your ID device with the desktop administration or Central Network Controller (CNC)
More informationHikCentral Control Client. User Manual
HikCentral Control Client User Manual Legal Information User Manual 2018 Hangzhou Hikvision Digital Technology Co., Ltd. About this Manual This Manual is subject to domestic and international copyright
More informationLinksys Stackable Switches
TECHNICAL BULLETIN Linksys Stackable Switches How to Build Stacks and Understand Their Operation This document describes how to stack Linksys switches and covers advanced stacking information, as well
More informationMULTI-PURPOSE SELF-CONTAINED DIGITAL ACCESS CONTROL KEYPAD
MULTI-PURPOSE SELF-CONTAINED DIGITAL ACCESS CONTROL PAD Programming & Installation Manual An Innovative Product Developed By: PROTECT - ON SYSTEMS LTD. MANUFACTURED BY: 20 R SINCE 1979 ADVANCED ELECTRONICS
More informationAnalysis Models for Safehome System. Team 07 (Choonghwi Lee, Wookjae Byun)
Analysis Models for Safehome System Team 07 (Choonghwi Lee, Wookjae Byun) Table of Contents 1. Introduction 3 2. Use cases and its diagrams 3 2.1 Use cases On / Off (Use case #1~#2) 3 2.1.1 Use case diagram
More information1 P age NEXTIVA CALL CENTER. Supervisor User Guide. nextiva.com/support 2015 NEXTIVA, ALL RIGHTS RESERVED
1 P age NEXTIVA CALL CENTER Supervisor User Guide nextiva.com/support 2015 NEXTIVA, ALL RIGHTS RESERVED 2 P age Creating Employees... 3 Creating an Employee... 3 Assigning Licenses to Employees... 7 Schedules...
More informationRFID/Digital Access Control Keypad
R Luminous/ RFID/Digital Access Control Keypad Model:YK-368L-R Germany EMC tested FEATURES AND FUNCTIONS Simple Programming, Easy Operation 3-Operation Mode: ID Card Operation, User Code Operation, ID
More informationControl Panels D9412GV4/D7412GV4. en Owner's Manual
Control Panels D9412GV4/D7412GV4 en Owner's Manual Control Panels Table of Contents en 3 Table of contents 1 Introduction 8 1.1 About documentation 9 2 Keypads overview 11 2.1 Identify your keypad style
More informationInstallation and User Manual
S2 Metal Waterproof Access Control Unit Installation and User Manual (Ness Part No. 101-082) 1 Introduction Ness S2 is an advanced, waterproof (IP65 rated) proximity and PIN Access Controller. S2 can support
More informationWall-Mounted Laptop Cabinet NOR-HNA1000-SO
Wall-Mounted Laptop Cabinet NOR-HNA1000-SO Safety Instructions CAUTION: Install the cabinet in a location where it will not get wet or damaged. Do not use this cabinet in a high-humidity location. Humidity
More informationIRONKEY D300S SECURE USB 3.0 FLASH DRIVE
IRONKEY D300S SECURE USB 3.0 FLASH DRIVE User Guide Document No. 48000130-001.A01 D300S Page 1 of 27 Table of Contents About This Manual... 3 System Requirements...3 Recommendations...3 Setup (Windows
More informationINT-TSI Brief User Manual
int-tsi_u_en 03/15 Keypad INT-TSI Brief User Manual SATEL sp. z o.o. ul. Budowlanych 66 80-298 Gdańsk POLAND tel. 58 320 94 00 info@satel.pl www.satel.eu Firmware version 1.04 WARNINGS Please read this
More informationThis chapter provides information about managing end user directory information.
End user setup This chapter provides information about managing end user directory information. About end user setup, page 1 End user deletion, page 2 End user settings, page 3 Create Cisco Unity Connection
More informationUser Guide V6.1g / 48730B
READYKEY User Guide Readykey for Windows Software 17231 V6.1g / 48730B UL Listings Trademarks UL 294 - Access Control System Units Microsoft, Windows, Windows NT are either registered trademarks or trademarks
More informationBHD-8000 Access Control Keypad and Card Reader. Wiring Diagram
BHD-8000 Access Control Keypad and Card Reader Wiring Diagram Frontal View Main Technical Specifications Item Operating Voltage Unlock Relay Operating Temperature Value 12VDC+12%/1.2A 12VDC/2A Normal Operation:
More informationConfiguration and Operation Manual for the SALTO
AxxonSoft Configuration and Operation Manual for the SALTO Integration Module Version 1.2 Moscow, 2011 Contents CONTENTS... 2 1 LIST OF TERMS... 3 2 INTRODUCTION... 4 2.1 Purpose of document... 4 2.2 Structure
More informationDryer. M720 Programming and Operation Manual. July 15, 2015 Revision 1.51
Dryer M720 Programming and Operation Manual July 15, 2015 Revision 1.51 Contents 1 Important Safety Information 1 1.1 FOR YOUR SAFETY - CAUTION!............................. 1 2 Control Overview 2 2.1
More information3/25/2015 Virtual Keypad Android App Help Guide - Rooms SCHEDULES
SCHEDULES This tab is only shown if Schedules are activated by your security company. Schedules allow you to program the times at which you normally turn your burglary protection on and off each day of
More informationPAC2. Series 3 USER CODE PROGRAMMING MANUAL
PAC2 Series 3 USER CODE PROGRAMMING MANUAL TABLE OF CONTENTS PAGE Entering Programming Mode... 1 Using a Presco Keypad without E Key... 2 Important Note About Programming... 2 Keypad Responses... 2 The
More informationUNIVERSAL EXPANDER FOR CARD / CHIP READERS INT-R. 1. Features. 2. Installation and start-up
UNIVERSAL EXPANDER FOR CARD / CHIP READERS INT-R int-r_en 09/11 The INT-R expander interfaces with the INTEGRA and CA-64 alarm control panels, replacing the previously offered CA-64 SR and CA-64 DR expanders.
More informationFinger Scanner Manual Book
Finger Keep er S er ies Finger Scanner Manual Book Page 1 F inger Keep er S eries Contents Chapter I Introduction of the Basic Operation of Finger Keeper..4 1. Interface Description of Finger Keeper....4
More informationDeckblatt. APL Operator Guide SIMATIC PCS 7. Application description June Applikationen & Tools. Answers for industry.
Deckblatt SIMATIC PCS 7 Application description June 2011 Applikationen & Tools Answers for industry. Industry Automation and Drive Technologies Service & Support Portal This article is taken from the
More informationRestricted Use Case Modeling Approach
RUCM TAO YUE tao@simula.no Simula Research Laboratory Restricted Use Case Modeling Approach User Manual April 2010 Preface Use case modeling is commonly applied to document requirements. Restricted Use
More informationUSER MANUAL. TL400B Fingerprint Lock with Voice Guide Feature. Version: 1.1 Date: Jul. 2017
USER MANUAL TL400B Fingerprint Lock with Voice Guide Feature Version: 1.1 Date: Jul. 2017 1 Content Read Before Use 1 Safety Caution 1 Structure 2 Basic Function 3 User Introduction 3 Operation and Voice
More informationINT-KSG Keypad Quick user s guide
INT-KSG Keypad Quick user s guide Firmware version 1.02 int-ksg_u_en 01/13 SATEL sp. z o.o. ul. Schuberta 79 80-172 Gdańsk POLAND tel. + 48 58 320 94 00 info@satel.pl www.satel.eu WARNINGS Please read
More information2 4PI175 issue 1_6/01. How to unset system in alarm. Programs 1, 2 and 3. Access codes. How to operate Personal Attack
Access codes Contents Unset system indications - - - - - - - - - - - System indication - - - - - - - - - - - - Access codes - - - - - - - - - - - - - - - - How to operate Personal - - - - - - How to unset
More informationWe believe that we can make the output of your Aligned Element project look more or less like your existing manually created documentation
Word Examples This document shows a few examples on what type of documentation you can generate with Aligned Elements. All examples are listed in the Table of Content on the following page. The naming
More informationSOFTWARE VERSION 3.20
48EPEP-00 SOFTWARE VERSION 3.20 HEXA PROGRAMMING: Addresses 000 to 043 and 300 to 527 are programmed using the Hexa Programming method. In this mode, you can enter any hexa-digit from 0-F where keys [1]
More informationNew Account Creation. 2. Launch the CarLink app. from your phone s application list. 3. Enter a name for the vehicle.
iphone USERS GUIDE 3/26/14 New Account Creation After having CarLink installed, follow the steps below to begin using your system. If you have already created an account on the Web app you will need to
More informationDigital Lock User Guide
Digital Lock User Guide KEYPAD Keypad digital locks are operated by a 4-7 digit User Code. Manager Keys provide management access and external power. Programming is accomplished via a Programming Key unique
More informationConsumer User Interface (CUI) Workflows for Adding Accounts
Consumer User Interface (CUI) Workflows for Adding Accounts 2018 Morningstar. All Rights Reserved. AccountView Version: 1.51 Document Version: 2 Document Issue Date: February 15, 2018 Technical Support:
More informationSigNET 200/300 User Guide
SigNET 200/300 User Guide Warning: While this system is an advanced design integrated security system, it does not offer guaranteed protection against burglary, fire or other emergency. Any alarm system,
More information1000-Series Biometric Safe Lock
1000-Series Biometric Safe Lock Innovative Security Solutions Designed and Manufactured In Australia To International Standards Distributor K.J.Ross Security Locks Pty. Ltd. A.C.N. 060 562 110 A.B.N. 23
More informationUsing triggers and actions
Using triggers and actions Important For Triggers and Actions to function correctly, the server must be running at all times. Triggers and Actions is a powerful feature. It can be used to report on specific
More informationINT-KSG Keypad Quick user s guide
INT-KSG Keypad Quick user s guide Firmware version 1.00 int-ksg_u_en 08/10 SATEL sp. z o.o. ul. Schuberta 79 80-172 Gdańsk POLAND tel. + 48 58 320 94 00 info@satel.pl www.satel.eu WARNINGS Please read
More informationONYX FINGERPRINT PASSWORD LOCK MANUAL
ONYX FINGERPRINT PASSWORD LOCK MANUAL PREFACE 1. Electronic locks are sensitive and advanced products with fragile micro-chips and hardware. Please be aware that the position and type of environment the
More informationApptix Online Backup by Mozy User Guide
Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing
More informationCase Management System
Case Management System Investigator/non-Administrator Instructions Your Lighthouse Services Case Management System (CMS) has been set up and is ready for your use. It is a powerful tool to oversee and
More informationUser Manual of TM-LA191 Bluetooth Lock
User Manual of TM-LA191 Bluetooth Lock Don't lock the door until the lock is working during installation and test. Please read all the following guide carefully. Unlock Ways APP ( Bluetooth Electronic
More informationImportant Notice. Customer Information. 2 WisDom User Manual
User Manual Important Notice This manual is delivered subject to the following conditions and restrictions: This manual contains proprietary information belonging to RISCO Group. The information is supplied
More informationEmerald ICE Index Prompt and Database Programming. June 10, 20 04
Emerald ICE and Database Programming June 10, 20 04 and Database Programming 01-1. Extension 01-(SN:101~164)- Show Extension: 01-SN-01 Position 01-SN-02 Tenant Group 01-SN-03 Pickup Group 01-SN-04 Paging
More informationios App User Manual Fill in the serial number (case insensitive), login (used to recover password), and choose a password.
1 ios App User Manual Install our iphone/ipad app from AppStore by searching "Wireless Tag List". Use the 12 digit serial numbers on your Ethernet Tag Manager to create a login. Keep the serial number
More informationIntegrated Conference Bridge Professional
Title page Communication Server 1000 Integrated Conference Bridge Professional iii Nortel Communication Server 1000 Nortel Integrated Conference Bridge Professional Revision history June 2007 Standard
More informationIDS. Users Guide to Keypad Functions S E C U R I T Y MANUAL NO D ISSUED NOVEMBER 2002 VERSION 2.
INHEP DIGITAL IDS S E C U R I T Y Users Guide to Keypad Functions MANUAL NO. 700-146-01D ISSUED NOVEMBER 2002 VERSION 2.17 Summary of Operation A rm/ disarm [#] + [USER CODE] Quick Quick Quick Away Arm
More informationNational Grid Short Term Operating Reserve System User Manual. National Grid Short Term Operating Reserve System User Manual
National Grid i Contents 1 Introduction... 1-1 1.1 Abbreviations and Glossary... 1-1 1.2 Purpose... 1-1 1.3 Overview... 1-1 2 STOR System Interface... 2-1 2.1 Screen Layout... 2-1 2.2 Colour Indication...
More informationPTC Integrity Integration With Microsoft Visual Studio (SDK)
PTC Integrity Integration With Microsoft Visual Studio (SDK) PTC provides a number of integrations for Integrated Development Environments (IDEs). IDE integrations allow you to access the workflow and
More information12/05/2017. Geneva ServiceNow Security Management
12/05/2017 Security Management Contents... 3 Security Incident Response...3 Security Incident Response overview... 3 Get started with Security Incident Response... 6 Security incident creation... 40 Security
More informationBartley Ridge SECURITY SYSTEMS. User s Guide
Bartley Ridge SECURITY SYSTEMS User s Guide 1 OPERATING INSTRUCTION 1.0 AUDIO VIDEO TELEPHONY SYSTEM 1.1 Resident s Phone Unit 1.2 Visitor Call Panel at lift lobby 2.0 PROXIMITY CARD ACCESS SYSTEM 3.0
More informationUML Modelling and the Art of Improv
UML Modelling and the Art of Improv Dr Terri Lydiard has over 30 years experience in Business Analysis. During this time she has worked for numerous major UK and International Companies, across a range
More informationCase Management System
Case Management System Investigator/non-Administrator Instructions Your Lighthouse Services Case Management System (CMS) has been set up and is ready for your use. It is a powerful tool to oversee and
More informationTroubleshooting. EAP-FAST Error Messages CHAPTER
CHAPTER 6 This chapter describes EAP-FAST error messages. This chapter also provides guidelines for creating strong passwords. The following topics are covered in this chapter:, page 6-1 Creating Strong
More informationPass4sure CASECURID01.70 Questions
Pass4sure.050-80-CASECURID01.70 Questions Number: 050-80-CASECURID01 Passing Score: 800 Time Limit: 120 min File Version: 4.8 http://www.gratisexam.com/ 050-80-CASECURID01 RSA SecurID Certified Administrator
More informationT9 Fingerprint Machine Hardware User Manual. Date: Version: 1.1
T9 Fingerprint Machine Hardware User Manual Date: 2010.07.27 Version: 1.1 (c)2010 Copyright Pegasus Equipments Ltd. All Rights Reserved. 1 Table of Content Introduction... 3 Installation... 3 Menu Structure...
More informationSILENCING AN ALARM. When the alarm bell or siren is sounding, enter your user code or present your keyfob to your keypad.
S Y S T E M U S E R G U I D E SILENCING AN ALARM When the alarm bell or siren is sounding, enter your user code or present your keyfob to your keypad. IS THIS A FALSE ALARM? YES NO displays. REAL ALARM
More informationAssociated Bank. Remote Deposit User Guide. Page 1 of 33
Associated Bank Remote Deposit User Guide Page 1 of 33 Table of Contents CHAPTER 1: GETTING STARTED... 3 Minimum system requirements... 3 Currently supported scanners include the following operating systems:...
More informationFinite State Machines and Statecharts
Finite State Machines and Statecharts Hassan Gomaa Dept of Information & Software Engineering George Mason University Reference: H. Gomaa, Chapter 10 - Designing Concurrent, Distributed, and Real-Time
More informationTotal Connect 2.0 Online Help
Security Events Users Locations Video Hints for use. After logging in hit F11 to toggle full screen mode. Hover over icons for tool tip help. Upon the initial login, control panel data should be imported
More informationK44 Code lock. Technical manual
K44 Code lock GB Technical manual Copyright 2002 Bewator AB, Solna, Sweden. Material from the K44 Technical manual may only be copied with the consent in writing of Bewator. Bewator reserves the right
More informationEnd User Setup. About End User Setup
This chapter provides information about managing end user directory information. About, on page 1 End User Deletion, on page 3 End User Settings, on page 4 Create Cisco Unity Connection Voice Mailbox,
More informationAgent Console. The Agent Console. The topics in this section provide information about the Agent Console.
Agent Console The topics in this section provide information about the Agent Console. The Agent Console The agent logs into the workstation The agent is automatically logged in to Intradiem; the Agent
More informationSpatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE)
Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) Model Builder User Guide Version 1.3 (24 April 2018) Prepared For: US Army Corps of Engineers 2018 Revision History Model
More informationLecture 8: Goals and Scenarios. Pohl K., Requirements Engineering: Fundamentals, Principles, and Techniques, Springer, 2010, 814p.
Lecture 8: Goals and Scenarios Pohl K., Requirements Engineering: Fundamentals, Principles, and Techniques, Springer, 2010, 814p. 2 Documenting Goals 3 Documenting Goals 1. Each goal must have a unique
More informationPearson Education 2005 Chapter 9 (Maciaszek - RASD 2/e) 2
MACIASZEK, L.A. (2005): Requirements Analysis and System Design, 2 nd ed. Addison Wesley, Harlow England, 504p. ISBN 0 321 20464 6 Chapter 9 Testing and Change Management Pearson Education Limited 2005
More informationDigital Electronic Lock OWNER S MANUAL
CAL-ROYAL CR3000 Digital Electronic Lock OWNER S MANUAL THANK YOU for purchasing CAL-ROYAL CR 3000 Digital Lock. Your new CAL-ROYAL CR3000 Digital Lock advanced features include: 1 Master Code for entry
More informationPerceptive Nolij Web. Release Notes. Version: 6.8.x
Perceptive Nolij Web Release Notes Version: 6.8.x Written by: Product Knowledge, R&D Date: June 2018 Copyright 2014-2018 Hyland Software, Inc. and its affiliates. Table of Contents Perceptive Nolij Web
More informationNew Password Reset for Dental Connect Provider
New Password Reset for Dental Connect Provider 1 INDEX Access Dental Connect for Providers:... 3 1. Username verification:... 4 1.1 user name not provided:... 5 1.2 Invalid user name:... 6 1.3 Invalid
More informationBusinessOnline Security Device Guide Introduction Objectives The Device LCD Display Keypad Menu/Backspace Button OK/Power Button Serial Number
BusinessOnline Security Device Guide Introduction Objectives This document contains instructions in the use of the Security Device that is used in conjunction with the BusinessOnline service provided by
More informationSNMP Web Management. User s Manual
SNMP Web Management User s Manual Suitable Product: SNMP Web Card SNMP Web Box Management Software for Uninterruptible Power Supply Systems Table of Contents 1. Overview... 1 1.1 Introduction... 1 1.2
More informationTRAINING MANAGEMENT SYSTEM MANUAL
TRAINING MANAGEMENT SYSTEM MANUAL Publication SPI82-0811 Table of Contents OVERVIEW... 1 INTRODUCTION... 1 ABOUT SAFE PASSAGE AND YOU... 2 SOFTWARE... 2 TRAINING... 2 UNDERSTANDING SAFE PASSAGE... 3 USING
More informationUSER MANUAL TEMPLATE ELECTRONIC DEADBOLT LOCK
Mark Ø1" (25.4mm) hole at center of door edge. 2" 1-3/4" 1-9/16" 1-3/8" 51 45 40 35 Fit here on door edge FOR BACKSET 70mm (2-3/4 ) FOR BACKSET 60mm (2-3/8 ) TEMPLATE Limited Warranty Statements 1. Warranty
More information